If you wish to purchase the right to make copies of this paper for distribution to others, please select the quantity.

Quantity:

Total Price =

You will receive a perfect bound, 8.5 x 11 inch, black and white printed copy of this PDF document with a glossy color cover. Currently shipping to U.S. addresses only. Your order will ship within 3 business days. For more details, view our FAQ.

Quantity:Total Price = $9.99 plus shipping (U.S. Only)

If you have any problems with this purchase, please contact us for assistance by email: Support@SSRN.com or by phone: 877-SSRNHelp (877 777 6435) in the United States, or +1 585 442 8170 outside of the United States. We are open Monday through Friday between the hours of 8:30AM and 6:00PM, United States Eastern.

The Revenge of Distance: Vulnerability Analysis of Critical Information Infrastructure

The events of 11 September 2001 brought an increased focus on security in the United States and specifically the protection of critical infrastructure. Critical infrastructure encompasses a wide array of physical assets such as the electric power grid, telecommunications, oil and gas pipelines, transportation networks and computer data networks. This paper will focus on computer data networks and the spatial implications of their susceptibility to targeted attacks. Utilising a database of national data carriers, simulations will be run to determine the repercussions of targeted attacks and what the relative merits of different methods of identifying critical nodes are. This analysis will include comparison of current methods employed in vulnerability analysis with spatially constructed methods incorporating regional and distance variables. In addition to vulnerability analysis a method will be proposed to analyse the fusion of physical and logical networks, and will discuss what new avenues this approach reveals. The analysis concludes that spatial information networks are vulnerable to targeted attacks and algorithms based on distance metrics do a better job of identifying critical nodes than classic accessibility indexes. The results of the analysis are placed in the context of public policy posing the question do private infrastructure owners have sufficient incentives to remedy vulnerabilities in critical networks.